This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.

Four slides taken from a 24 April 2013 NSA presentation detail how SECONDDATE man-in-the-middle attacks were used against targets in Pakistan and Lebanon: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.

TOP SECRET//SI//NOFORN
The overall classification of this brief is
(U) SIGINT Development Support II
Program Management Review
► 24 April 2013
TOP SECRET//COMINT//NOFORN
Derived Fro...

A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.

NSA closely monitored the 2004 spread of avian influenza in preparation for a possible pandemic. "As our IC colleagues have said, containing the threat of infectious disease comes down to 'detection, detection, detection. SIGINT is probably going to get it first,'" the author writes.

A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.

Article lays out questions surrounding al Qaeda's involvement in the narcotics trade in Afghanistan. While there appear to be many low-level al Qaeda operatives involved in the drug trade, there is no intelligence indicating mid- or high-level operatives are involved.

This 2007 post from the NSA’s internal SIDToday newsletter describes the 11th annual meeting of the Sigint Seniors Counterterrorism (SISECT) Analytic Working Group (AWG), which focused on terrorists’ use of the internet: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.

This internal NSA information paper, dated 19 April 2013, describes a “far reaching technical and analytic relationship” with Israel’s SIGINT National Unit (ISNU): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.

After two decades of development, China is on the brink of mass-producing mobile ICBMs with the range to target the entire U.S. "China is seeking to establish a credible and survivable nuclear deterrent, and will likely adhere to its long-standing 'no first use' policy."

This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.

This internal NSA post from September 2006 describes the evolution of the European Security Operations Center and the focus of the US-German collaboration in signals intelligence: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.

﻿(U//FOUOKTh^European. Security Center to Become the 'ESOC'
FROM:
A&P‘s Director, Enterprise Management (S2)
Run Date: 09/11/2006
(S//SI) NSA to help build up capabilities of the intell...

This August 2010 post from the internal NSA newsletter SIDtoday shows how the agency aided US diplomacy on the issue of Iran sanctions – by surveilling the communications of other members of the UN Security Council: see the Época article Spies of the digital age, 2 August 2013.

This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.

This NSA presentation from October 2009 explains how XKeyScore automatically extracts phone numbers from intercepts: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.

This March 2007 post from the internal NSA newsletter SIDToday draws attention to voice-masking technology used by subjects of surveillance to frustrate the agency’s voice-recognition efforts: see the Intercept article Finding Your Voice, 19 January 2018.

This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.

﻿TOP S E C R E T/HVCCO
1. (S) preamblei in 1968 President Johnson and Prime Minister
Eshkol agreed that an intelligence exchange would take place
between the United States and Israel. This und...

President Bush considers Venezuelan President Hugo Chavez a "threat to democracy in the region and a threat to U.S. interests in particular." But "from a SIGINT perspective, Venezuela poses a particularly difficult challenge. With Castro as his mentor, Chavez has learned the importance of communications security and has made sure that his subordinates understand this as well."

The author outlines major issues facing China and explains how they are likely to "dominate Chinese decision-makers' thinking for the next six months," as well as affect the regional and global economy.